1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nimfa-mama [501]
3 years ago
6

Upang mas maging maganda ang larawang ini-edit, dapat isaalang-alang ang tatlong mahahalagang elemento. Ano-ano ang mga ito?​

Computers and Technology
1 answer:
Gemiola [76]3 years ago
4 0

Answer:

is this english?

Explanation:

You might be interested in
What company was affected by the cloudbleed vulnerability?
DIA [1.3K]

The <em>cloud bleed vuneraliblity</em> describes the security flaw which was discovered in 2017 and had affected internet service company CloudFlare and many websites using the company's services.

CloudFlare is a internet service company which operates to provide security of data to millions of websites. However, a glitch occured during a certain security update which led to a loophole which wasn't discovered for months.

This made the user data on CloudFlare's network susceptible over the course of that period. It was reported that companies such as Uber, OKcupid and several others on the CloudFlare security network were affected.

Therefore, the company affected by the cloud bleed vuneraliblity is CloudFlare.

Learn more :brainly.com/question/25018707

7 0
3 years ago
Why does a HTML seen to work even when its broken? why does the code sometimes turn pink?
OverLord2011 [107]

the reason HTML seems to work even if it has syntax errors is due to browser having built in ways to parse the code meaning it will still show but most likely look way different then you would want.

the code may turn pink due to syntax errors

5 0
3 years ago
Why is the transmission of information impartial on websites?
Alex777 [14]
I believe that the best answer among the choices provided by the question is <span>B.Websites cannot manage the amount of information they receive. </span>
Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.
4 0
3 years ago
Read 2 more answers
22. A user receives an error message when logging into Salesforce. What is the first check performed by an administrator?
WARRIOR [948]

Answer:

The first check performed by an administrator that it  View the login history.

Explanation:

When user logging into Salesforce it receives an error message into the  screen it view the logging detail which help us take to troubleshoot the problem. The logging history keeps track information like  who is access the system last time ,date etc .login history  also display up to 20,000 records of user logins for the last six months.

4 0
3 years ago
What year was internet inverted
alex41 [277]

\large\blue{\mid{\underline{\overline{\tt { →\:January \:1, 1983}\mid}}}}

  • ARPANET→Advanced Research Projects Agency Network
  • the forerunner of the Internet.

\purple{\rule{15mm}{2.9pt}} \red{\rule18mm{2.5pt}} \orange{ \rule18mm{2.5pt}}

\sf{\:мѕнαcкεя\: ♪...}

5 0
2 years ago
Other questions:
  • During the processing stage what does the computer do
    12·1 answer
  • When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment met
    6·1 answer
  • A popular use of cd-rw and cd-r discs is to create audio cds. what is the process of copying audio and/or video data from a purc
    11·1 answer
  • The most common types of utility programs fall into these categories. accessibility calculation communication data entry enterta
    6·2 answers
  • Explicit knowledge can be documented and codified, whereas tacit knowledge encompasses insights, judgment, creative processes, a
    9·1 answer
  • Similarites between hardware and software
    9·1 answer
  • Which value can be entered to cause the following code segment to display the message "That number is acceptable."? ____.
    15·1 answer
  • What correctly describes the features of the service called kickstarter?
    14·2 answers
  • Create a program which reads in CSV data of Creatures and loads them into aHash Map. The key of this hash map will be the name o
    10·1 answer
  • HELPPP
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!